Intel vPro with AMT 7.0

Report
Robust vPro Manageability & Security
Intel® vPro™ Technology with AMT 7.0
Intel vPro with Active Management Technology (AMT) 7.0 allows in-house or
outsourced IT to easily manage all software and hardware computing assets
within your organization. Heal systems remotely regardless of the OS or system
state and protect their enterprise from malicious software attacks. New AMT 7.0
provides host-based configuration for easy setup.
Starting with the support for WS-Man, Intel AMT 7.0 conforms to the DASH
standards. DASH delivers standards-based web services management (WSManagement) for desktop and mobile client systems. KVM (Keyboard, Video,
and Mouse) and text console redirection support for remote management. USB
and media redirection support for virtualization. BIOS (Basic Input and Output)
management for remotely change BIOS settings. NIC (Network Interface Card)
management for remote network settings. Operating system status for OS
status update. Software update capability for remotely upgrading firmware and
software. Battery management for remotely manage batteries.
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
Robust vPro Manageability & Security
TPM 1.2 Compliant Design
TPM (Trusted Platform Module) 1.2 is designed to assure the integrity of
the client platform. Start the power-on boot process from a trusted condition
and extend this trust until the OS has fully booted and applications running.
TPM also allow a secure storage and reporting of security relevant metrics.
and detect changes to previous configurations and derive decisions how to
proceed. TPM conforms with corporate-level security requirement and
lowers TCO over product life cycle. Other features of TPM 1.2 include disk
encryption, password protection from dictionary or brute-force attacks, and
digital rights management.
Smart Card*/Acer Bio-Protection Fingerprint
Reader
Integrate smart card based authentication with your employee identification
and shut down unwanted access. Acer Bio-Protection Fingerprint Reader
only recognized your unique fingerprint and prevent unauthorized access to
your system
* Smart card is only available on TM 6595
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
Robust vPro Manageability & Security
Multi-level Acer ProShield Security from BIOSlevel up
Multi-level Acer ProShield Security featuring pre-boot authentication (PBA)
with BIOS/HDD password, alternative Windows log-on with built-in
fingerprint reader, and TPM password for data protection. Create your own
Personal Secure Drive (PSD) to seamlessly store and encrypt your critical
files. Permanently remove unwanted files or folders from your computer
beyond recovery with File Shredder utility. Import/export or remotely update
BIOS settings with ease with manageability functions.
Built-in anti-theft solution
Built-in anti-theft solution with Intel Anti-Theft technology and Absolute Data
Protection (ADP) by Absolute Software. Intel Anti-Theft technology is a
hardware-based security mechanism desgined to protect your PC even when it
is lost or stolen. ADP is an anti-theft software that allows users to track their PC
if it's lost or stolen. When enabled, ADP, working in conjunction with Intel AntiTheft technology, allows users to remotely delete files or freeze the stolen
notebook for retrieval. Users can also obtain the geolocation of their stolen
notebook.
Acer Backup/eRecovery Manager
Acer Backup Manager empowers you backup your valuable data or media
portfolio at ease and protect your intellectual asset. Acer eRecovery
Management provides recovery on-demand for peace of mind
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
Intel vPro with AMT 7.0
• What is Intel vPro with AMT 7.0?
• Benefits
• User Scenarios and Applications
Technology Marketing Brief
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
Intel vPro with AMT 7.0
Security, multiplied
Simplify IT’s/MSP’s
ability to manage
your system with
KVM and host-based
setup and
configuration.
Remote
troubleshooting and
maintenance to
dramatically lower
manageability costs
More secure and
robust virtualization
with built in Intel®
Virtualization and
Intel® Trusted
Execution Technology
• Improve network traffic filtering and isolate clients under attack
• Automatic security agent’s verification and immediate remote
restoration enhance your preventive security efforts.
• Deploy off-hours patches faster, speeding up patch saturation
• Hardware-assisted antivirus protection of Execute Disable Bit
protects your PCs from certain viruses.
Maximizing manageability
• Diagnose and repair both wired and wireless systems remotely
• Remote asset tracking and checks the presence of management
agents virtually anytime.
Host-based setup and configuration
•
Activate your Intel vPro processor based PCs in a matter of
minutes with streamlined scripts
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
Benefits
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
User Scenarios and Applications
Hardware
KVM Remote
Control
Simplify IT or service
provider’s ability to manage
your system with KVM
Remote
Power
On/Off
Host-Based
Configuration
Host-based configuration for
rapid deployment of Intel vPro
technology with streamlined
script
Remote
Manageme
nt
This document is the intellectual property of Acer Inc. and may not be used, reproduced, modified, or re-utilized in any way without permission by Acer Inc.
Massive power on/off
ensure that tasks requiring
a reboot are completed and
confirmed
Remote diagnosis and
repair of client systems

similar documents